Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

Report: US would make Internet wiretaps easier

Broad new regulations being drafted by the Obama administration would make it easier for law enforcement and national security officials to eavesdrop on Internet and e-mail communications like social networking Web sites ...

After Paris attacks, US and UK discuss privacy vs. security

President Barack Obama argued Friday that a resurgent fear of terrorism across Europe and the United States should not lead countries to overreact and shed privacy protections, even as British Prime Minister David Cameron ...

Threats of int'l BlackBerry bans echo US debate

(AP) -- Threats by the governments of India, the United Arab Emirates and Saudi Arabia to shut down BlackBerry's corporate e-mail services reflect unease about a technology that the U.S. government also took a while to accept.

Protecting light communication with random objects

Researchers from the Complex Photonic Systems (COPS) group used two layers of random materials to encrypt and decrypt a message sent via light communication. With that, they hid the sender and receiver simultaneously, and ...

Who goes there? Verifying identity online

We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful ...

FBI chief urges 'robust debate' on encryption

FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

RIM tells India no access for BlackBerry emails

BlackBerry maker Research In Motion (RIM) said Thursday it could not give Indian law enforcers a way to monitor its corporate mail service, days ahead of a government deadline for access.

page 3 from 4